Filters
Question type

Identifying human resources, documentation, and data information assets of an organization is less difficult than identifying hardware and software assets.

Correct Answer

verifed

verified

Of the three types of mitigation plans, the ____________________ plan is the most strategic and long-term, as it focuses on the steps to ensure the continuation of the organization.

Correct Answer

verifed

verified

BC
Business Continui...

View Answer

____________________ is the process of identifying risk, as represented by vulnerabilities, to an organization's information assets and infrastructure, and taking steps to reduce this risk to an acceptable level.

Correct Answer

verifed

verified

Risk management

_________ addresses are sometimes called electronic serial numbers or hardware addresses.


A) HTTP
B) IP
C) DHCP
D) MAC

Correct Answer

verifed

verified

A(n) qualitative assessment is based on characteristics that do not use numerical measures. _________________________

Correct Answer

verifed

verified

The __________ is the difference between an organization's observed and desired performance.


A) performance gap
B) objective
C) issue delta
D) risk assessment

Correct Answer

verifed

verified

____________________ include information and the systems that use, store, and transmit information.

Correct Answer

verifed

verified

__________ feasibility analysis examines user acceptance and support, management acceptance and support, and the overall requirements of the organization's stakeholders.


A) Organizational
B) Technical
C) Operational
D) Political

Correct Answer

verifed

verified

The results from risk assessment activities can be delivered in a number of ways: a report on a systematic approach to risk control, a project-based risk assessment, or a topic-specific risk assessment.

Correct Answer

verifed

verified

The _________ control strategy attempts to eliminate or reduce any remaining uncontrolled risk through the application of additional controls and safeguards.


A) termination
B) defense
C) transference
D) mitigation

Correct Answer

verifed

verified

Benchmarking is the process of comparing other organizations' activities against the practices used in one's own organization to produce results it would like to duplicate. _________________________

Correct Answer

verifed

verified

__________ plans usually include all preparations for the recovery process, strategies to limit losses during the disaster, and detailed steps to follow when the smoke clears, the dust settles, or the flood waters recede.


A) IR
B) DR
C) BC
D) BR

Correct Answer

verifed

verified

The formal decision-making process used when considering the economic feasibility of implementing information security controls and safeguards is called a(n) __________.


A) ARO
B) CBA
C) ALE
D) SLE

Correct Answer

verifed

verified

B

Using the simplified information classification scheme outlined in the text, all information that has been approved by management for public release has a(n) ____________________ classification.

Correct Answer

verifed

verified

The computed value of the ALE compares the costs and benefits of a particular control alternative to determine whether the control is worth its cost. _________________________

Correct Answer

verifed

verified

The first phase of risk management is _________.


A) risk identification
B) design
C) risk control
D) risk evaluation

Correct Answer

verifed

verified

A

The most common example of a mitigation procedure is a contingency plan. _________________________

Correct Answer

verifed

verified

The __________ strategy is the choice to do nothing to protect a vulnerability and to accept the outcome of its exploitation.


A) defense
B) transference
C) mitigation
D) acceptance

Correct Answer

verifed

verified

The value of information to the organization's competition should influence the asset's valuation.

Correct Answer

verifed

verified

When it is necessary to calculate, estimate, or derive values for information assets, you might give consideration to the value incurred from the cost of protecting the information.

Correct Answer

verifed

verified

Showing 1 - 20 of 108

Related Exams

Show Answer